rafael pass
play

Rafael Pass Based on [P-Seeman-Shelat] and [P-Shi] Traditional - PowerPoint PPT Presentation

Analysis and Design of Blockchains Rafael Pass Rafael Pass Based on [P-Seeman-Shelat] and [P-Shi] Traditional distributed systems: The Permissioned Model Consistency Liveness Paxos/PBFT Traditional distributed systems: The


  1. Analysis and Design of Blockchains Rafael Pass Rafael Pass Based on [P-Seeman-Shelat] and [P-Shi]

  2. Traditional distributed systems: The “Permissioned” Model ● Consistency ● Liveness Paxos/PBFT

  3. Traditional distributed systems: The “Permissioned” Model ● Nodes a-priori known and authenticated ● 30 years of distributed systems Paxos/PBFT ● Multi-party computation [GMW,BGW, ...] ○ Nearly all works assume authenticated channels

  4. The “Permissionless” Model: Bitcoin/Blockchain The Times 03/Jan/2009 Chancellor on brink of second bailout for banks .

  5. The “Permissionless” Model ● Nodes do not know each other a-priori The Times 03/Jan/2009 Chancellor on brink of second bailout for banks . ● Nodes come and go ● ANYONE can join ● No network synchronization Relatively little is known about this model

  6. The “Permissionless” Model ● Strong impossibility results known in the “permissionless” (“unauthenticated”) model [BCLPR05] ○ Consistency is impossible ○ Sybil attacks unavoidable. ■ [BCLPR05] defined “weakened” security model (w/o consistency)

  7. Nakamoto’s Blockchain [Nak’08] Prevents Sybil attacks with Proofs-of-Work Puzzles [DN’92] Claims blockchain achieves “public ledger” assuming “honest majority”: ● Consistency : everyone sees the same history ● Liveness : everyone can add new transactions

  8. Nakamoto’s Blockchain [Nak’08] Prevents Sybil attacks with Proofs-of-Work Puzzles [DN’92] Claims blockchain achieves “public ledger” assuming “honest majority” 2 amazing aspects: ● Overcomes permissionless barrier [BCLPR’05] ● Consistency : everyone sees the same history ● Liveness : everyone can add new transactions ● Overcomes ⅓ barrier even in permissioned setting [LSP’83] 2 amazing aspects: ● Overcomes permissionless barrier [BCLPR] ● Overcomes ⅓ barrier even in permissioned setting[

  9. Everyone wants a “blockchain” 9

  10. Nakamoto’s Blockchain: OPEN PROBLEMS ● WHAT IS a blockchain? ○ no definition of an “abstract blockchain” ● Does Nakamoto’s protocol achieve CONSISTENCY ? ○ “Specific attacks” don’t work [N’08,GKL’15, SZ’15] ○ 49.1% attack (with 10s network delays) claimed [DW’14] ● Is Nakamoto’s consensus OPTIMAL ? ○ Several issues known (load,latency,incentives)

  11. This talk Desiderata of blockchain Nakamoto Achieves Desiderata Overcoming Bottlenecks

  12. This talk Desiderata of blockchain Nakamoto Achieves Desiderata Overcoming Bottlenecks

  13. What is a blockchain?

  14. Idea: Use Proof-of-Work Puzzles to defend against sybil attacks Users have to do work to cast votes.

  15. How to build a “blockchain”

  16. elaine ➔ mariana : Ƀ 50 How to build a “blockchain”

  17. “Hash function” D > H ( , , ) How to build a “blockchain”

  18. puzzle solution Difficulty D > ( , , ) H Search for a puzzle solution

  19. puzzle solution Difficulty D > ( , , ) H Search for a puzzle solution

  20. D > H ( , , ) We found a new block

  21. D > H ( , , ) Best way to find a solution is brute- force search: model H as RO

  22. What if you join network and you see this.

  23. Honest nodes only “believe” longest chain

  24. Elaine → Mariana Elaine wants to erase this transaction

  25. Elaine → Mariana For Elaine to erase his transaction, he has to find a longer chain!

  26. Elaine → Mariana “If transaction is sufficiently deep, he cannot do this unless he has majority hashpower” ● [Nak’08]: “simply trying to mine alternative chain fails” ● [GLK’15]: in synchronous network ● [SZ’15]: “non-withholding attacks” fail also with Delta-delay networks

  27. Elaine → Mariana “If transaction is sufficiently deep, he cannot do this unless he has majority hashpower” ● [Nak’08]: “simply trying to mine alternative chain fails” ● [GLK’15]: in synchronous network ● [SZ’15]: “non-withholding attacks” fail also with Δ-delays

  28. Blockchain abstraction w/ prob exp(- k ) Consistency: Honest nodes agree on all but last k blocks ≤ k unstable ≤ k unstable

  29. Blockchain abstraction Future-self w/ prob exp(- k ) consistency Consistency: Honest nodes agree on all but last k blocks ≤ k unstable ≤ k unstable

  30. Blockchain abstraction w/ prob exp(- k ) Consistency: Honest nodes agree on all but last k blocks ≤ k unstable ≤ k unstable

  31. Blockchain abstraction w/ prob exp(- k ) Consistency: Honest nodes agree on all but last k blocks Chain quality: Any consecutive k blocks contain “sufficiently many” honest blocks k

  32. Blockchain abstraction w/ prob exp(- k ) Consistency: Honest nodes agree on all but last k blocks Chain quality: Any consecutive k blocks contain “sufficiently many” honest blocks Chain growth: Chain grows at a steady rate

  33. Blockchain implies “state machine replication” in the permissionless model Consistency Traditional “state machine replication” Chain quality Consistency Chain growth Liveness

  34. This talk Desiderata of blockchain Nakamoto Achieves Desiderata Overcoming Bottlenecks

  35. Theorem [P-Seeman-Shelat]: For every ρ <1/2 , if “mining difficulty” is appropriately set (as a function of the network delay Δ , and total mining power), Nakamoto’s blockchain guarantees: ● Consistency ● Chain quality: 1 - ρ /(1- ρ ) ● Chain growth: O(1/ Δ ) where ρ adv’s fraction of hashpower, and adv controls the network

  36. Theorem [P-Seeman-Shelat]: For every ρ <1/3 , if “mining difficulty” is appropriately set (as a function of the network delay Δ , and total mining power), Nakamoto’s blockchain guarantees: ● Consistency ● Chain quality: 1 - (1/3)/(2/3) = 1/2 ● Chain growth: O(1/ Δ ) where ρ adv’s fraction of hashpower, and adv controls the network

  37. Theorem [P-Seeman-Shelat]: For every ρ <1/2 , if “mining difficulty” is appropriately set (as a function of the network delay Δ , and total mining power), Nakamoto’s blockchain guarantees: ● Consistency ● Chain quality: 1 - ρ /(1- ρ ) ● Chain growth: O(1/ Δ ) where ρ adv’s fraction of hashpower, and adv controls the network

  38. Theorem [P-Seeman-Shelat]: For every ρ <1/2 , if “mining difficulty” is appropriately set (as a function of the network delay Δ , and total mining power), Nakamoto’s blockchain guarantees: ● Consistency ● Chain quality: 1 - ρ /(1- ρ ) “Blocks are found SLOWER than Δ ” ● Chain growth: O(1/ Δ ) where ρ adv’s fraction of hashpower, and adv controls the network

  39. Theorem [P-Seeman-Shelat]: For every ρ <1/2 , if “mining difficulty” is appropriately set (as a function of the network delay Δ , and total mining power), Nakamoto’s blockchain guarantees: ● Consistency ● Chain quality: 1 - ρ /(1- ρ ) ● Chain growth: O(1/ Δ ) “Blocktime” >> Δ where ρ adv’s fraction of hashpower, and adv controls the network

  40. “Appropriately set” When c = 60 (10 min blocktime, 10s network delays) Secure: ρ < 49.57 (contradicts [DW’14]’attack!) Attack: ρ > 49.79

  41. “Appropriately set” Mining rate of Network Delay Mining rate honest players of Adv

  42. Theorem [Security of Nakamoto] For every ρ <1/2, if mining difficulty is appropriately set (as a function of the network delay, and total mining power), Nakamoto’s blockchain guarantees a) consistency, b) chain quality 1 - ρ /(1- ρ ), and c) Chain growth: O(1/ Δ ) Theorem [Blatant attack]: For every ρ >0, for every mining difficulty, there exists a network delay such that Nakamoto’s blockchain is inconsistent and has 0 chain quality

  43. This talk Desiderata of blockchain Nakamoto Achieves Desiderata Overcoming Bottlenecks

  44. Nakamoto: ISSUES Terrible Not incentive performance compatible

  45. Bitcoin has terrible performance • Cost per confirmed transaction in Bitcoin: $6.20 • 7 tx/sec , 10 min TX confirmation time c.f. Visa credit card: average 2,000 tx/sec , peak 59,000 tx/sec [Source: K. Croman et al. On Scaling Decentralized Blockchains. In Bitcoin workshop, 2016.]

  46. Traditional BFT protocols are performant PBFT at ~100 nodes: Throughput: ~10,000 tx/sec Confirmation time: ~ seconds [Source: K. Croman et al. On Scaling Decentralized Blockchains. In Bitcoin workshop, 2016.]

  47. Hybrid consensus [P-Shi] Snailchain TXs BFT committee

  48. Hybrid Consensus: The idea k unstable k

  49. Hybrid Consensus: The idea k unstable k PBFT

  50. Hybrid Consensus: The idea k unstable k PBFT

  51. Hybrid Consensus: The idea k unstable k: PBFT Chain quality : ⅔ committee honest (if ¾ honest overall) Committee members sign each (seq #, tx) Chain growth : this won’t take too long Non-members count ⅓k Consistency : everyone agrees on committee

  52. Hybrid Consensus: The idea k unstable k: PBFT Achieves static security ● Committee members sign each confirmed (seq #, tx) Not adaptively secure ● Non-members count ⅓ k + 1 sigs ● Can deal with it using rotating committees

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend